Trusteer's security team has recently identified a new offering from a Russian cybercrime forum member: An exploit that, according to the seller, is successful 95 percent of the time.
A recap of Kevin Mandia's "State of the Hack: One Year after the APT1 Report" keynote at RSA 2014 and "Hacking Exposed: PLA Edition" talk by Dmitri Alperovitch and George Kurtz.
Mikko Hypponen's "Government as Malware Authors" version at TrustyCon. There is a value for security professionals, researchers and leaders in the community to revive the keynotes and continue the discussion.
It has become extremely difficult for organizations to prevent bad things from happening in their network and the “assume you’re breached” mentality is being brought up in more conversations. How can we prevent, or at least minimize, the...
APTs Are So Tomorrow: Enterprises Need to Take Care of the Basics Like SQL Injection and Cross Site Scripting Before Worrying About More Sophisticated Threats “Step right up folks! Behold the child what has four legs! Marvel at bearded lady and...
Intrusion prevention systems (IPS) have become one of the most critical layers in today's network security infrastructure. Although a mature technology, IPS technology must deal with an even broader and more sophisticated attack spectrum.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
Cloud is seen as very important for business innovation while at the same time there is increasing executive awareness and scrutiny over how the Cloud will be secured. You can start thinking about Cloud security by asking seven questions.
Businesses should protect themselves against advanced malware; although it makes up a small sliver of malware threats, its impact can be devastating.
As I sat down to watch the new James Bond film, armed with the usual fizzy drinks and sugary sweets, I was surprised when Bond decided to take on the cyber terrorist at large single-handed and with no Security product in sight!